Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Dealing with MacOS Catalina Notary Service #16009

Open
russorat opened this issue Nov 21, 2019 · 4 comments
Open

Dealing with MacOS Catalina Notary Service #16009

russorat opened this issue Nov 21, 2019 · 4 comments
Assignees
Labels

Comments

@russorat
Copy link
Contributor

We need to figure out how to handle the MacOS notary service that causes our binaries to be untrusted.

some info from how Go is dealing with it: golang/go#34986

Open to suggestions on how we should handle this.

@russorat
Copy link
Contributor Author

go1.14 will allow us to fix this

@russorat russorat added this to the OSS GA milestone Apr 8, 2020
@russorat
Copy link
Contributor Author

still an issue:
image

@russorat russorat removed this from the OSS GA milestone May 13, 2021
@russorat
Copy link
Contributor Author

still an issue:
image

@danxmoran danxmoran added area/2.x OSS 2.0 related issues and PRs area/build labels Nov 19, 2021
@danxmoran
Copy link
Contributor

influxdata/telegraf#8878 shows how the telegraf team set this up in their project.

Now that we've split up our build process, it should be possible to create a new CI job to sign the mac binary that runs between the mac build and the final package-and-upload step.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
Projects
None yet
Development

No branches or pull requests

3 participants